Intelligence & Surveillance

Just Security’s expert authors provide legal and policy analysis of intelligence and surveillance activities, focusing on their impact on national security and on civil liberties and privacy rights, and their oversight by Congress and the courts.

× Clear Filters
1,805 Articles
Just Security

National Security Letters and Leak Investigations

Journalists were reminded again last week of how little legal protection actually exists when the federal government decides to investigate national security leaks. In an ongoing…
Just Security

“Ideating” on ISIS and Silicon Valley

In a lot of Silicon Valley meetings, participants “iterate,” “ideate,” and “sync,” and do other buzzwordy things. Every once in a while something innovative and impactful…
Just Security

USA Freedom: The Rubber Meets the Road

The National Security Agency has released its Transparency Report on the implementation of the USA Freedom Act — as well as the minimization procedures to be used for the new…
Just Security

James Comey’s Default-Encryption Bogeyman

FBI Director James Comey recently told the Senate Judiciary Committee that encryption routinely poses a problem for law enforcement. He stated that encryption has “moved from…
Just Security

Fixing Pre-Publication Review: What Should Be Done?

Jack Goldsmith and Oona Hathaway called attention in several recent columns to the pre-publication review process (here, here, here, and here) that many current and former national…
Just Security

Settlement of NYPD Muslim Surveillance Lawsuits: A Platform for Better Oversight

Last week, the City of New York agreed to settle two federal lawsuits challenging the NYPD’s surveillance of American Muslims, promising to reform the rules that govern how the…
Just Security

Content Is Content, No Matter How Small

Recently, Orin Kerr and I had a brief conversation on Twitter regarding the Fourth Amendment and the content/non-content distinction. Specifically, Orin asked those of us who subscribe…
Just Security

A Few Keystrokes Could Solve the Crime. Would You Press Enter?

Image credit: Wikimedia Commons Suppose a laptop were found at the apartment of one of the perpetrators of last year’s Paris attacks. It’s searched by the authorities pursuant…
Just Security

Closing GTMO: “Why wasn’t there a clearly delineated strategy?”

It’s not even the most glaring error in Dina Temple-Raston’s review of Charlie Savage’s Power Wars, but this passage sure does stand out: While the issue of closing…
Just Security

Congress Squawks as Surveillance Chickens Come Home to Roost

A year that has alternated between major surveillance reforms and calls for new spying laws in the wake of ISIS attacks is set to close with a pendulum swing back against NSA surveillance…
Just Security

The Scope of the Prepublication Review Problem, and What to Do About It

Editor’s note: This post also appears on Lawfare. The problems in the prepublication review process that we identified in our Washington Post op-ed and in a subsequent post…
Just Security

Path Dependence and the Prepublication Review Process

Editor’s note: This post also appears on Lawfare. Over the weekend, we wrote an op-ed in the Washington Post about the lifetime prepublication review process required of nearly…
1-12 of 1,805 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: